2010-04-28 23:51:54 +04:00
|
|
|
<?php
|
2010-04-21 14:04:22 +04:00
|
|
|
/*
|
|
|
|
+----------------------------------------------------------------------+
|
|
|
|
| Copyright (c) 2002-2007 Christian Stocker, Hartmut Holzgraefe |
|
|
|
|
| All rights reserved |
|
|
|
|
| |
|
|
|
|
| Redistribution and use in source and binary forms, with or without |
|
|
|
|
| modification, are permitted provided that the following conditions |
|
|
|
|
| are met: |
|
|
|
|
| |
|
|
|
|
| 1. Redistributions of source code must retain the above copyright |
|
|
|
|
| notice, this list of conditions and the following disclaimer. |
|
|
|
|
| 2. Redistributions in binary form must reproduce the above copyright |
|
|
|
|
| notice, this list of conditions and the following disclaimer in |
|
|
|
|
| the documentation and/or other materials provided with the |
|
|
|
|
| distribution. |
|
|
|
|
| 3. The names of the authors may not be used to endorse or promote |
|
|
|
|
| products derived from this software without specific prior |
|
|
|
|
| written permission. |
|
|
|
|
| |
|
|
|
|
| THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
|
|
|
| "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
|
|
|
| LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
|
|
|
|
| FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
|
|
|
|
| COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, |
|
|
|
|
| INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, |
|
|
|
|
| BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
|
|
|
|
| LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
|
|
|
|
| CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
|
|
|
|
| LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN |
|
|
|
|
| ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|
|
|
|
| POSSIBILITY OF SUCH DAMAGE. |
|
|
|
|
+----------------------------------------------------------------------+
|
2010-05-23 00:08:08 +04:00
|
|
|
--- modified for ownCloud ---
|
2011-03-02 01:20:16 +03:00
|
|
|
*/
|
|
|
|
require_once("lib/base.php");
|
2011-04-16 12:12:53 +04:00
|
|
|
require_once("HTTP/WebDAV/Server.php");
|
|
|
|
require_once("System.php");
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
/**
|
|
|
|
* Filesystem access using WebDAV
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @author Hartmut Holzgraefe <hartmut@php.net>
|
|
|
|
* @version @package-version@
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
class HTTP_WebDAV_Server_Filesystem extends HTTP_WebDAV_Server
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Root directory for WebDAV access
|
|
|
|
*
|
|
|
|
* Defaults to webserver document root (set by ServeRequest)
|
|
|
|
*
|
|
|
|
* @access private
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
var $base = "";
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Serve a webdav request
|
|
|
|
*
|
|
|
|
* @access public
|
2011-03-02 01:20:16 +03:00
|
|
|
* @param string
|
2010-04-21 14:04:22 +04:00
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function ServeRequest($base = false)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
// special treatment for litmus compliance test
|
|
|
|
// reply on its identifier header
|
|
|
|
// not needed for the test itself but eases debugging
|
|
|
|
if (isset($this->_SERVER['HTTP_X_LITMUS'])) {
|
|
|
|
error_log("Litmus test ".$this->_SERVER['HTTP_X_LITMUS']);
|
|
|
|
header("X-Litmus-reply: ".$this->_SERVER['HTTP_X_LITMUS']);
|
|
|
|
}
|
|
|
|
|
|
|
|
// set root directory, defaults to webserver document root if not set
|
|
|
|
if ($base) {
|
|
|
|
$this->base = realpath($base); // TODO throw if not a directory
|
|
|
|
} else if (!$this->base) {
|
|
|
|
$this->base = $this->_SERVER['DOCUMENT_ROOT'];
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// let the base class do all the work
|
|
|
|
parent::ServeRequest();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* No authentication is needed here
|
|
|
|
*
|
|
|
|
* @access private
|
|
|
|
* @param string HTTP Authentication type (Basic, Digest, ...)
|
|
|
|
* @param string Username
|
|
|
|
* @param string Password
|
|
|
|
* @return bool true on successful authentication
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function check_auth($type, $user, $pass)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* PROPFIND method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @param array return array for file properties
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function PROPFIND(&$options, &$files)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
// get absolute fs path to requested resource
|
2010-05-08 00:50:59 +04:00
|
|
|
$fspath = $options["path"];
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// sanity check
|
2010-05-11 22:35:29 +04:00
|
|
|
if (!OC_FILESYSTEM::file_exists($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// prepare property array
|
|
|
|
$files["files"] = array();
|
|
|
|
// store information for the requested path itself
|
|
|
|
$files["files"][] = $this->fileinfo($options["path"]);
|
|
|
|
// information for contained resources requested?
|
2011-03-02 01:20:16 +03:00
|
|
|
if (!empty($options["depth"]) && OC_FILESYSTEM::is_dir($fspath) && OC_FILESYSTEM::is_readable($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
// make sure path ends with '/'
|
|
|
|
$options["path"] = $this->_slashify($options["path"]);
|
|
|
|
|
|
|
|
// try to open directory
|
2010-05-08 00:50:59 +04:00
|
|
|
$handle = @OC_FILESYSTEM::opendir($fspath);
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
if ($handle) {
|
|
|
|
// ok, now get all its contents
|
|
|
|
while ($filename = readdir($handle)) {
|
|
|
|
if ($filename != "." && $filename != "..") {
|
|
|
|
$files["files"][] = $this->fileinfo($options["path"].$filename);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// TODO recursion needed if "Depth: infinite"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ok, all done
|
|
|
|
return true;
|
2011-03-02 01:20:16 +03:00
|
|
|
}
|
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
/**
|
|
|
|
* Get properties for a single file/resource
|
|
|
|
*
|
|
|
|
* @param string resource path
|
|
|
|
* @return array resource properties
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function fileinfo($path)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2010-07-04 12:36:50 +04:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// map URI path to filesystem path
|
2010-05-08 00:50:59 +04:00
|
|
|
$fspath =$path;
|
2010-04-21 14:04:22 +04:00
|
|
|
|
|
|
|
// create result array
|
|
|
|
$info = array();
|
|
|
|
// TODO remove slash append code when base clase is able to do it itself
|
2011-03-02 01:20:16 +03:00
|
|
|
$info["path"] = OC_FILESYSTEM::is_dir($fspath) ? $this->_slashify($path) : $path;
|
|
|
|
$info["props"] = array();
|
2010-04-21 14:04:22 +04:00
|
|
|
// no special beautified displayname here ...
|
|
|
|
$info["props"][] = $this->mkprop("displayname", strtoupper($path));
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// creation and modification time
|
2010-05-08 00:50:59 +04:00
|
|
|
$info["props"][] = $this->mkprop("creationdate", OC_FILESYSTEM::filectime($fspath));
|
|
|
|
$info["props"][] = $this->mkprop("getlastmodified", OC_FILESYSTEM::filemtime($fspath));
|
2010-04-21 14:04:22 +04:00
|
|
|
// Microsoft extensions: last access time and 'hidden' status
|
2010-05-08 00:50:59 +04:00
|
|
|
$info["props"][] = $this->mkprop("lastaccessed", OC_FILESYSTEM::fileatime($fspath));
|
2010-04-21 14:04:22 +04:00
|
|
|
$info["props"][] = $this->mkprop("ishidden", ('.' === substr(basename($fspath), 0, 1)));
|
|
|
|
// type and size (caller already made sure that path exists)
|
2010-05-08 00:50:59 +04:00
|
|
|
if ( OC_FILESYSTEM::is_dir($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
// directory (WebDAV collection)
|
|
|
|
$info["props"][] = $this->mkprop("resourcetype", "collection");
|
2011-03-02 01:20:16 +03:00
|
|
|
$info["props"][] = $this->mkprop("getcontenttype", "httpd/unix-directory");
|
2010-04-21 14:04:22 +04:00
|
|
|
} else {
|
|
|
|
// plain file (WebDAV resource)
|
|
|
|
$info["props"][] = $this->mkprop("resourcetype", "");
|
2010-05-08 00:50:59 +04:00
|
|
|
if ( OC_FILESYSTEM::is_readable($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
$info["props"][] = $this->mkprop("getcontenttype", $this->_mimetype($fspath));
|
2010-07-04 12:02:10 +04:00
|
|
|
} else {
|
2010-04-21 14:04:22 +04:00
|
|
|
$info["props"][] = $this->mkprop("getcontenttype", "application/x-non-readable");
|
2011-03-02 01:20:16 +03:00
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
$info["props"][] = $this->mkprop("getcontentlength", OC_FILESYSTEM::filesize($fspath));
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
// get additional properties from database
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("SELECT ns, name, value FROM *PREFIX*properties WHERE path = ?");
|
|
|
|
$res = $query->execute(array($path))->fetchAll();
|
2010-07-04 11:54:54 +04:00
|
|
|
foreach($res as $row){
|
2010-04-21 14:04:22 +04:00
|
|
|
$info["props"][] = $this->mkprop($row["ns"], $row["name"], $row["value"]);
|
|
|
|
}
|
|
|
|
return $info;
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
/**
|
|
|
|
* try to detect the mime type of a file
|
|
|
|
*
|
|
|
|
* @param string file path
|
|
|
|
* @return string guessed mime type
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function _mimetype($fspath)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2010-05-08 00:50:59 +04:00
|
|
|
return OC_FILESYSTEM::getMimeType($fspath);
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* HEAD method handler
|
2011-03-02 01:20:16 +03:00
|
|
|
*
|
2010-04-21 14:04:22 +04:00
|
|
|
* @param array parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function HEAD(&$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
// get absolute fs path to requested resource
|
2010-05-08 00:50:59 +04:00
|
|
|
$fspath = $options["path"];
|
2010-04-21 14:04:22 +04:00
|
|
|
|
|
|
|
// sanity check
|
2010-05-08 00:50:59 +04:00
|
|
|
if (! OC_FILESYSTEM::file_exists($fspath)) return false;
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// detect resource type
|
2011-03-02 01:20:16 +03:00
|
|
|
$options['mimetype'] = $this->_mimetype($fspath);
|
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// detect modification time
|
|
|
|
// see rfc2518, section 13.7
|
|
|
|
// some clients seem to treat this as a reverse rule
|
|
|
|
// requiering a Last-Modified header if the getlastmodified header was set
|
2010-05-08 00:50:59 +04:00
|
|
|
$options['mtime'] = OC_FILESYSTEM::filemtime($fspath);
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// detect resource size
|
2010-05-08 00:50:59 +04:00
|
|
|
$options['size'] = OC_FILESYSTEM::filesize($fspath);
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* GET method handler
|
2011-03-02 01:20:16 +03:00
|
|
|
*
|
2010-04-21 14:04:22 +04:00
|
|
|
* @param array parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function GET(&$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2010-05-08 00:50:59 +04:00
|
|
|
// get absolute fs path to requested resource)
|
|
|
|
$fspath = $options["path"];
|
2010-04-21 14:04:22 +04:00
|
|
|
// is this a collection?
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return $this->GetDir($fspath, $options);
|
|
|
|
}
|
|
|
|
|
|
|
|
// the header output is the same as for HEAD
|
|
|
|
if (!$this->HEAD($options)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// no need to check result here, it is handled by the base class
|
2010-05-08 00:50:59 +04:00
|
|
|
$options['stream'] = OC_FILESYSTEM::fopen($fspath, "r");
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* GET method handler for directories
|
|
|
|
*
|
|
|
|
* This is a very simple mod_index lookalike.
|
|
|
|
* See RFC 2518, Section 8.4 on GET/HEAD for collections
|
|
|
|
*
|
|
|
|
* @param string directory path
|
|
|
|
* @return void function has to handle HTTP response itself
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function GetDir($fspath, &$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
$path = $this->_slashify($options["path"]);
|
|
|
|
if ($path != $options["path"]) {
|
|
|
|
header("Location: ".$this->base_uri.$path);
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
// fixed width directory column format
|
|
|
|
$format = "%15s %-19s %-s\n";
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::is_readable($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
$handle = OC_FILESYSTEM::opendir($fspath);
|
2010-04-21 14:04:22 +04:00
|
|
|
if (!$handle) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
echo "<html><head><title>Index of ".htmlspecialchars($options['path'])."</title></head>\n";
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
echo "<h1>Index of ".htmlspecialchars($options['path'])."</h1>\n";
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
echo "<pre>";
|
|
|
|
printf($format, "Size", "Last modified", "Filename");
|
|
|
|
echo "<hr>";
|
|
|
|
|
|
|
|
while ($filename = readdir($handle)) {
|
|
|
|
if ($filename != "." && $filename != "..") {
|
|
|
|
$fullpath = $fspath."/".$filename;
|
|
|
|
$name = htmlspecialchars($filename);
|
2011-03-02 01:20:16 +03:00
|
|
|
printf($format,
|
2010-04-21 14:04:22 +04:00
|
|
|
number_format(filesize($fullpath)),
|
2011-03-02 01:20:16 +03:00
|
|
|
strftime("%Y-%m-%d %H:%M:%S", filemtime($fullpath)),
|
2010-04-21 14:04:22 +04:00
|
|
|
"<a href='$name'>$name</a>");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
echo "</pre>";
|
|
|
|
|
|
|
|
closedir($handle);
|
|
|
|
|
|
|
|
echo "</html>\n";
|
|
|
|
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* PUT method handler
|
2011-03-02 01:20:16 +03:00
|
|
|
*
|
2010-04-21 14:04:22 +04:00
|
|
|
* @param array parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function PUT(&$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2010-05-08 00:50:59 +04:00
|
|
|
$fspath = $options["path"];
|
2010-04-21 14:04:22 +04:00
|
|
|
$dir = dirname($fspath);
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::file_exists($dir) || !OC_FILESYSTEM::is_dir($dir)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "409 Conflict"; // TODO right status code for both?
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
$options["new"] = ! OC_FILESYSTEM::file_exists($fspath);
|
2010-04-21 14:04:22 +04:00
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if ($options["new"] && !OC_FILESYSTEM::is_writeable($dir)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "403 Forbidden";
|
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!$options["new"] && !OC_FILESYSTEM::is_writeable($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "403 Forbidden";
|
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!$options["new"] && OC_FILESYSTEM::is_dir($fspath)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "403 Forbidden";
|
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
$fp = OC_FILESYSTEM::fopen($fspath, "w");
|
2010-04-21 14:04:22 +04:00
|
|
|
|
|
|
|
return $fp;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* MKCOL method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function MKCOL($options)
|
|
|
|
{
|
2010-05-08 00:50:59 +04:00
|
|
|
$path = $options["path"];
|
2010-04-21 14:04:22 +04:00
|
|
|
$parent = dirname($path);
|
|
|
|
$name = basename($path);
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::file_exists($parent)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "409 Conflict";
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::is_dir($parent)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "403 Forbidden";
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if ( OC_FILESYSTEM::file_exists($parent."/".$name) ) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "405 Method not allowed";
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($this->_SERVER["CONTENT_LENGTH"])) { // no body parsing yet
|
|
|
|
return "415 Unsupported media type";
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
$stat = OC_FILESYSTEM::mkdir($parent."/".$name, 0777);
|
2010-04-21 14:04:22 +04:00
|
|
|
if (!$stat) {
|
2011-03-02 01:20:16 +03:00
|
|
|
return "403 Forbidden";
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return ("201 Created");
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
/**
|
|
|
|
* DELETE method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function DELETE($options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2010-05-08 00:50:59 +04:00
|
|
|
$path =$options["path"];
|
|
|
|
if (!OC_FILESYSTEM::file_exists($path)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "404 Not found";
|
|
|
|
}
|
2010-07-05 02:39:38 +04:00
|
|
|
$lock=self::checkLock($path);
|
|
|
|
if(is_array($lock)){
|
|
|
|
$owner=$options['owner'];
|
|
|
|
$lockOwner=$lock['owner'];
|
|
|
|
if($owner==$lockOwner){
|
|
|
|
return "423 Locked";
|
|
|
|
}
|
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($path)) {
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("DELETE FROM *PREFIX*properties WHERE path LIKE '?%'");
|
|
|
|
$query->execute(array($this->_slashify($options["path"])));
|
2010-05-08 00:50:59 +04:00
|
|
|
OC_FILESYSTEM::delTree($path);
|
2010-04-21 14:04:22 +04:00
|
|
|
} else {
|
2010-05-08 00:50:59 +04:00
|
|
|
OC_FILESYSTEM::unlink($path);
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("DELETE FROM *PREFIX*properties WHERE path = ?");
|
|
|
|
$query->execute(array($options[path]));
|
2010-04-21 14:04:22 +04:00
|
|
|
|
|
|
|
return "204 No Content";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* MOVE method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function MOVE($options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
return $this->COPY($options, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* COPY method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function COPY($options, $del=false)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
// TODO Property updates still broken (Litmus should detect this?)
|
|
|
|
|
|
|
|
if (!empty($this->_SERVER["CONTENT_LENGTH"])) { // no body parsing yet
|
|
|
|
return "415 Unsupported media type";
|
|
|
|
}
|
|
|
|
|
|
|
|
// no copying to different WebDAV Servers yet
|
|
|
|
if (isset($options["dest_url"])) {
|
|
|
|
return "502 bad gateway";
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
$source = $options["path"];
|
|
|
|
if (!OC_FILESYSTEM::file_exists($source)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "404 Not found";
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($source)) { // resource is a collection
|
2010-04-21 14:04:22 +04:00
|
|
|
switch ($options["depth"]) {
|
2011-03-02 01:20:16 +03:00
|
|
|
case "infinity": // valid
|
2010-04-21 14:04:22 +04:00
|
|
|
break;
|
|
|
|
case "0": // valid for COPY only
|
|
|
|
if ($del) { // MOVE?
|
|
|
|
return "400 Bad request";
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case "1": // invalid for both COPY and MOVE
|
2011-03-02 01:20:16 +03:00
|
|
|
default:
|
2010-04-21 14:04:22 +04:00
|
|
|
return "400 Bad request";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
$dest = $options["dest"];
|
2010-04-21 14:04:22 +04:00
|
|
|
$destdir = dirname($dest);
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::file_exists($destdir) || !OC_FILESYSTEM::is_dir($destdir)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "409 Conflict";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
$new = !OC_FILESYSTEM::file_exists($dest);
|
2010-04-21 14:04:22 +04:00
|
|
|
$existing_col = false;
|
|
|
|
|
|
|
|
if (!$new) {
|
2010-05-08 00:50:59 +04:00
|
|
|
if ($del && OC_FILESYSTEM::is_dir($dest)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
if (!$options["overwrite"]) {
|
|
|
|
return "412 precondition failed";
|
|
|
|
}
|
|
|
|
$dest .= basename($source);
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::file_exists($dest)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
$options["dest"] .= basename($source);
|
|
|
|
} else {
|
|
|
|
$new = true;
|
|
|
|
$existing_col = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!$new) {
|
|
|
|
if ($options["overwrite"]) {
|
|
|
|
$stat = $this->DELETE(array("path" => $options["dest"]));
|
|
|
|
if (($stat{0} != "2") && (substr($stat, 0, 3) != "404")) {
|
2011-03-02 01:20:16 +03:00
|
|
|
return $stat;
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return "412 precondition failed";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($del) {
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::rename($source, $dest)) {
|
2010-07-04 20:08:35 +04:00
|
|
|
return "500 Internal server error";
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
$destpath = $this->_unslashify($options["dest"]);
|
|
|
|
if (is_dir($source)) {
|
2011-04-16 13:46:49 +04:00
|
|
|
$dpath=$destpath;
|
|
|
|
$path=$options["path"];
|
|
|
|
$query = OC_DB::prepare("UPDATE *PREFIX*properties
|
|
|
|
SET path = REPLACE(path, ?, ?)
|
|
|
|
WHERE path LIKE '?%'");
|
|
|
|
$query->execute(array($path,$dpath,$path));
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("UPDATE *PREFIX*properties
|
|
|
|
SET path = ?
|
|
|
|
WHERE path = ?");
|
|
|
|
$query->execute(array($dpath,$path));
|
2010-04-21 14:04:22 +04:00
|
|
|
} else {
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($source)) {
|
2010-07-04 20:08:35 +04:00
|
|
|
$files = OC_FILESYSTEM::getTree($source);
|
2010-04-21 14:04:22 +04:00
|
|
|
} else {
|
|
|
|
$files = array($source);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!is_array($files) || empty($files)) {
|
|
|
|
return "500 Internal server error";
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
foreach ($files as $file) {
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($file)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
$file = $this->_slashify($file);
|
|
|
|
}
|
|
|
|
$destfile = str_replace($source, $dest, $file);
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-05-08 00:50:59 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($file)) {
|
|
|
|
if (!OC_FILESYSTEM::file_exists($destfile)) {
|
|
|
|
if (!OC_FILESYSTEM::is_writeable(dirname($destfile))) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "403 Forbidden";
|
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::mkdir($destfile)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "409 Conflict";
|
|
|
|
}
|
2010-05-08 00:50:59 +04:00
|
|
|
} else if (!OC_FILESYSTEM::is_dir($destfile)) {
|
2010-04-21 14:04:22 +04:00
|
|
|
return "409 Conflict";
|
|
|
|
}
|
|
|
|
} else {
|
2010-05-08 00:50:59 +04:00
|
|
|
if (!OC_FILESYSTEM::copy($file, $destfile)) {
|
2010-09-29 01:06:29 +04:00
|
|
|
return "409 Conflict($source) $file --> $destfile ".implode('::',$files);
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
return ($new && !$existing_col) ? "201 Created" : "204 No Content";
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* PROPPATCH method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function PROPPATCH(&$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
global $prefs, $tab;
|
|
|
|
|
|
|
|
$msg = "";
|
|
|
|
$path = $options["path"];
|
|
|
|
$dir = dirname($path)."/";
|
|
|
|
$base = basename($path);
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
foreach ($options["props"] as $key => $prop) {
|
|
|
|
if ($prop["ns"] == "DAV:") {
|
|
|
|
$options["props"][$key]['status'] = "403 Forbidden";
|
|
|
|
} else {
|
2011-04-16 13:46:49 +04:00
|
|
|
$path=$options['path'];
|
|
|
|
$name=$prop['name'];
|
|
|
|
$ns=$prop['ns'];
|
|
|
|
$val=$prop['val'];
|
2010-04-21 14:04:22 +04:00
|
|
|
if (isset($prop["val"])) {
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("REPLACE INTO *PREFIX*properties (path,name,ns,value) VALUES(?,?,?,?)");
|
|
|
|
$query->execute(array($path,$name,$ns,$val));
|
2010-04-21 14:04:22 +04:00
|
|
|
} else {
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = $query = OC_DB::prepare("DELETE FROM *PREFIX*properties WHERE path = ? AND name = ? AND ns = ?");
|
|
|
|
$query->execute(array($path,$name,$ns));
|
2011-03-02 01:20:16 +03:00
|
|
|
}
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* LOCK method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function LOCK(&$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2010-07-04 13:32:39 +04:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
// get absolute fs path to requested resource
|
2010-05-08 00:50:59 +04:00
|
|
|
$fspath = $options["path"];
|
2010-04-21 14:04:22 +04:00
|
|
|
// TODO recursive locks on directories not supported yet
|
|
|
|
// makes litmus test "32. lock_collection" fail
|
2010-07-05 02:39:38 +04:00
|
|
|
if (OC_FILESYSTEM::is_dir($fspath) && !empty($options["depth"])) {
|
|
|
|
switch($options["depth"]){
|
|
|
|
case 'infinity':
|
|
|
|
$recursion=1;
|
|
|
|
break;
|
|
|
|
case '0':
|
|
|
|
$recursion=0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
$recursion=0;
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
$options["timeout"] = time()+300; // 5min. hardcoded
|
|
|
|
|
|
|
|
if (isset($options["update"])) { // Lock Update
|
2011-04-16 13:46:49 +04:00
|
|
|
$where = "WHERE path = ? AND token = ?";
|
2010-04-21 14:04:22 +04:00
|
|
|
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("SELECT owner, exclusivelock FROM *PREFIX*locks $where");
|
|
|
|
$res = $query->execute(array($options[path],$options[update]))->fetchAll();
|
2010-04-21 14:04:22 +04:00
|
|
|
|
2010-07-05 02:39:38 +04:00
|
|
|
if (is_array($res) and isset($res[0])) {
|
|
|
|
$row=$res[0];
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("UPDATE `*PREFIX*locks` SET `expires` = , `modified` = $where");
|
|
|
|
$query->execute(array($options[timeout],time(),$options[path],$options[update]));
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2010-04-21 14:04:22 +04:00
|
|
|
$options['owner'] = $row['owner'];
|
|
|
|
$options['scope'] = $row["exclusivelock"] ? "exclusive" : "shared";
|
|
|
|
$options['type'] = $row["exclusivelock"] ? "write" : "read";
|
|
|
|
|
|
|
|
return true;
|
2010-07-05 02:39:38 +04:00
|
|
|
} else {//check for indirect refresh
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("SELECT * FROM *PREFIX*locks WHERE recursive = 1");
|
|
|
|
$res = $query->execute();
|
2010-07-05 02:39:38 +04:00
|
|
|
foreach($res as $row){
|
|
|
|
if(strpos($options['path'],$row['path'])==0){//are we a child of a folder with an recursive lock
|
2011-04-16 13:46:49 +04:00
|
|
|
$where = "WHERE path = ? AND token = ?";
|
|
|
|
$query = OC_DB::prepare("UPDATE `*PREFIX*locks` SET `expires` = ?, `modified` = ? $where");
|
|
|
|
$query->execute(array($options[timeout],time(),$row[path],$options[update]));
|
|
|
|
$options['owner'] = $row['owner'];
|
|
|
|
$options['scope'] = $row["exclusivelock"] ? "exclusive" : "shared";
|
|
|
|
$options['type'] = $row["exclusivelock"] ? "write" : "read";
|
|
|
|
return true;
|
2010-07-05 02:39:38 +04:00
|
|
|
}
|
|
|
|
}
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
}
|
2011-03-02 01:20:16 +03:00
|
|
|
|
2011-04-16 13:46:49 +04:00
|
|
|
$locktoken=$options['locktoken'];
|
|
|
|
$path=$options['path'];
|
2010-09-29 01:06:29 +04:00
|
|
|
$time=time();
|
2011-04-16 13:46:49 +04:00
|
|
|
$owner=$options['owner'];
|
|
|
|
$timeout=$options['timeout'];
|
2010-09-29 01:06:29 +04:00
|
|
|
$exclusive=($options['scope'] === "exclusive" ? "1" : "0");
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("INSERT INTO `*PREFIX*locks`
|
2011-03-02 01:20:16 +03:00
|
|
|
(`token`,`path`,`created`,`modified`,`owner`,`expires`,`exclusivelock`,`recursive`)
|
2011-04-16 13:46:49 +04:00
|
|
|
VALUES (?,?,?,?,?,'timeout',?,?)");
|
|
|
|
$result=$query->execute(array($locktoken,$path,$time,$time,$owner,$exclusive,$recursion));
|
2010-07-05 02:39:38 +04:00
|
|
|
if(!OC_FILESYSTEM::file_exists($fspath) and $rows>0) {
|
|
|
|
return "201 Created";
|
|
|
|
}
|
2011-04-16 13:46:49 +04:00
|
|
|
return PEAR::isError($result) ? "409 Conflict" : "200 OK";
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* UNLOCK method handler
|
|
|
|
*
|
|
|
|
* @param array general parameter passing array
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function UNLOCK(&$options)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("DELETE FROM *PREFIX*locks
|
|
|
|
WHERE path = ?
|
|
|
|
AND token = ?");
|
|
|
|
$query->execute(array($options[path]),$options[token]);
|
|
|
|
return PEAR::isError($result) ? "409 Conflict" : "204 No Content";
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* checkLock() helper
|
|
|
|
*
|
|
|
|
* @param string resource path to check for locks
|
|
|
|
* @return bool true on success
|
|
|
|
*/
|
2011-03-02 01:20:16 +03:00
|
|
|
function checkLock($path)
|
2010-04-21 14:04:22 +04:00
|
|
|
{
|
|
|
|
$result = false;
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("SELECT *
|
|
|
|
FROM *PREFIX*locks
|
|
|
|
WHERE path = ?
|
|
|
|
");
|
|
|
|
$res = $query->execute(array($path))->fetchAll();
|
2010-07-05 02:39:38 +04:00
|
|
|
if (is_array($res) and isset($res[0])) {
|
2010-05-08 00:50:59 +04:00
|
|
|
$row=$res[0];
|
2010-04-21 14:04:22 +04:00
|
|
|
|
|
|
|
if ($row) {
|
|
|
|
$result = array( "type" => "write",
|
|
|
|
"scope" => $row["exclusivelock"] ? "exclusive" : "shared",
|
|
|
|
"depth" => 0,
|
|
|
|
"owner" => $row['owner'],
|
|
|
|
"token" => $row['token'],
|
2011-03-02 01:20:16 +03:00
|
|
|
"created" => $row['created'],
|
|
|
|
"modified" => $row['modified'],
|
2010-07-05 02:39:38 +04:00
|
|
|
"expires" => $row['expires'],
|
|
|
|
"recursive" => $row['recursive']
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
//check for recursive locks;
|
2011-04-16 13:46:49 +04:00
|
|
|
$query = OC_DB::prepare("SELECT *
|
|
|
|
FROM *PREFIX*locks
|
2010-07-05 02:39:38 +04:00
|
|
|
WHERE recursive = 1
|
2011-04-16 13:46:49 +04:00
|
|
|
");
|
|
|
|
$res = $query->execute()->fetchAll();
|
2010-07-05 02:39:38 +04:00
|
|
|
foreach($res as $row){
|
|
|
|
if(strpos($path,$row['path'])==0){//are we a child of a folder with an recursive lock
|
|
|
|
$result = array( "type" => "write",
|
|
|
|
"scope" => $row["exclusivelock"] ? "exclusive" : "shared",
|
|
|
|
"depth" => 0,
|
|
|
|
"owner" => $row['owner'],
|
|
|
|
"token" => $row['token'],
|
2011-03-02 01:20:16 +03:00
|
|
|
"created" => $row['created'],
|
|
|
|
"modified" => $row['modified'],
|
2010-07-05 02:39:38 +04:00
|
|
|
"expires" => $row['expires'],
|
|
|
|
"recursive" => $row['recursive']
|
2010-04-21 14:04:22 +04:00
|
|
|
);
|
2010-07-05 02:39:38 +04:00
|
|
|
}
|
2010-04-21 14:04:22 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-07-04 13:32:39 +04:00
|
|
|
?>
|